Document imaging security and forensics ecosystem considerations
Abstract
References
Index Terms
- Document imaging security and forensics ecosystem considerations
Recommendations
Security and Integrity Analysis Using Indicators
CYBERSECURITY '12: Proceedings of the 2012 International Conference on Cyber SecurityComputer systems today are under constant attack by adversaries that are looking for opportunistic ways to gain access and exfiltrate data, cause disruption or chaos, or leverage the computer for their own use. Whatever the motives are, these attacks ...
A taxonomy of internet traceback
Tracing back an anonymous hacker in the internet has been very hard to accomplish mainly due to the complexity of the internet and the lack of any deployed technology targeting this goal. In this paper, we introduce the most prominent research work done ...
Smartphone Security Challenges
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
Comments
Information & Contributors
Information
Published In

- General Chair:
- Apostolos Antonacopoulos,
- Program Chairs:
- Michael Gormish,
- Rolf Ingold
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 236Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in